1993
DOI: 10.1145/173668.168635
|View full text |Cite
|
Sign up to set email alerts
|

Efficient software-based fault isolation

Abstract: One way to provide fault isolation among cooperating software modules is to place each in its own address space. However, for tightly-coupled modules, this so-

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
258
0
2

Year Published

1997
1997
2018
2018

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 322 publications
(261 citation statements)
references
References 21 publications
0
258
0
2
Order By: Relevance
“…In an early published use, it described an approach for achieving fault isolation (Wahbe et al, 1993). Discussions where practicing programmers are trying to understand what sandboxing is often fail to achieve a precise resolution and instead describe the term by listing products that are typically considered to be sandboxes or cases where sandboxes are often used (http://stackoverflow.com/questions/2126174/what-is-sandboxing, http://security.…”
Section: What Is a Sandbox?mentioning
confidence: 99%
See 1 more Smart Citation
“…In an early published use, it described an approach for achieving fault isolation (Wahbe et al, 1993). Discussions where practicing programmers are trying to understand what sandboxing is often fail to achieve a precise resolution and instead describe the term by listing products that are typically considered to be sandboxes or cases where sandboxes are often used (http://stackoverflow.com/questions/2126174/what-is-sandboxing, http://security.…”
Section: What Is a Sandbox?mentioning
confidence: 99%
“…Indeed, Wahbe was working to solve the problem of encapsulating software modules (to keep a fault in a distrusted module from affecting other modules) when he popularized the term in this domain. 1 1 While it is clear from at least one publication that the term sandbox was used in computer security earlier than Wahbe's paper (Neumann, 1990), many early software protection papers cite Wahbe as the origin of the "sandbox" method (Zhong, Edwards & Rees, 1997;Wallach et al, 1997;Schneider, 1997). At least one early commentator felt that this use of the term "sandbox" was merely renaming "trusted computing bases" (TCB) (McLean, 1997).…”
Section: What Is a Sandbox?mentioning
confidence: 99%
“…Centralized, general purpose security kernels [13] generally suffered from this problem [14]. Current work to develop languagebased security mechanisms aims for simple enforcement mechanisms, but ones that are distributed throughout the program [15,16].…”
Section: Minimize the Variety Size And Complexity Of Trusted Componmentioning
confidence: 99%
“…3 This approach was reasonably successful in some Burroughs machines [21], and has reappeared in current Java language systems, which attempt to certify that a program of Java bytecode is safe to run before dispatching it. As the introduction of lightweight processes and threads has weakened the boundaries between computations in order to reduce the time needed to swap contexts, methods for introducing inline checks to assure security properties have gained interest, as reflected by the work of Wahbe et al [15] on software fault isolation and Schneider [22] on security automata. Certifying code before it is run has also gained interest, as reflected by work on proof-carrying code [23] and static flow analysis [24] of computations.…”
Section: Defining Domainsmentioning
confidence: 99%
“…Third, PCC provides an expressive framework for treating a variety of mobile code safeties, owing to the use of first-order predicate logic (Necula, 1997), higher-order logic (Appel and Felty, 2000), or temporal logic (Bernard and Lee, 2002) as its underlying inference engine. This generality might be contrasted with the use of some specific type systems (Bershad et al, 1995;Lindholm and Yellin, 1999) or with the treatment of some specific safety properties (Wahbe et al, 1993). Fourth, the static verification mechanism in PCC enables each code to be executed quickly without any additional run-time checks.…”
Section: Introductionmentioning
confidence: 99%